EP1929422B1 - Method, apparatus, and system for securing data on a removable memory device - Google Patents

Method, apparatus, and system for securing data on a removable memory device Download PDF

Info

Publication number
EP1929422B1
EP1929422B1 EP06787031A EP06787031A EP1929422B1 EP 1929422 B1 EP1929422 B1 EP 1929422B1 EP 06787031 A EP06787031 A EP 06787031A EP 06787031 A EP06787031 A EP 06787031A EP 1929422 B1 EP1929422 B1 EP 1929422B1
Authority
EP
European Patent Office
Prior art keywords
memory device
removable memory
access
user
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Not-in-force
Application number
EP06787031A
Other languages
German (de)
French (fr)
Other versions
EP1929422A1 (en
Inventor
David N. Skinner
Yancy T. Chen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Publication of EP1929422A1 publication Critical patent/EP1929422A1/en
Application granted granted Critical
Publication of EP1929422B1 publication Critical patent/EP1929422B1/en
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Definitions

  • An embodiment of the present invention relates to the field of data protection for computer memory systems. More specifically, embodiments of the present invention relate to providing secure and controlled access to removable memory devices and controlling access to removable memory devices on the basis of a manually entered security key.
  • Removable memory devices are found in a wide variety of data-processing systems. Not only traditional data-processing devices such as laptop computers, but other digital equipment such as hand-held computing devices, cameras, personal digital assistants, video gaming consoles, digital video recorders, digital entertainment equipment, and calculators may include hardware, software, and operating system support for removable memory devices.
  • removable memory devices were limited to relatively small capacity, low performance solid-state devices, such as flash memory cards. But with improvements in rotating magnetic storage technology, practical and affordable removable disk drive designs have become common. These removable memory devices offer substantial improvements in capacity, performance, and practicality. In addition, advances in digital technology have increased the storage capacity available in a practical removable solid-state memory device. Finally, emerging technologies promise grater capacities with better performance and lower costs aimed at the portable and emovable storage markets.
  • removable memory devices As capacity, performance, and usefulness of removable memory devices continue to improve, many data processing systems have begun to ely on removable memory devices for the majority of the system's non-volatile storage. Even large desktop computing systems employ removable memory devices to facilitate data portability between systems. For example; a user can carry large quantities of data from home to work, or while traveling, increasing productivity. Other uses include archiving data, and storing digital entertainment data, such as video or music, for use later.
  • removable and portable memory devices One result of these advances in removable and portable memory devices is that users tend to store much more data on removable memory devices. As removable memory device reliability has improved, a larger quantity of mission-critical or sensitive data is being stored on removable memory devices. Furthermore, as the devices have become smaller, more desirable, and more common it is inevitable that a larger number of them are eventually possessed by persons who do not own nor have permission to access the data on the removable memory devices in their possession.
  • WO 00/42491 discloses a compact, self-contained, personal key.
  • the personal key comprises a USB-compliant interface releasably coupleable to a host processing device; a memory; and a processor.
  • the processor provides the host processing device conditional access to data storable in the memory as well as the functionality required to manage files stored in the personal key and for performing computations based on the data in the files.
  • the personal key also comprises an integral user input device and an integral user output device.
  • the input and output devices communicate with the processor by communication paths which are independent from the USB-compliant interface, and thus allow the user to communicate with the processor without manifesting any private information external to the personal key.
  • EP 1557741 discloses an information storage device that comprises a password input section for inputting a password to be notified only to the information storage device without outputting it to external equipment connected to it by way of a predetermined interface, a password collation section for collating the password input by way of the password input section and an access permission section for permitting an access to the storage section of the device from the external equipment connected by way of the predetermined interface in response to the collation of the password by the password collation section.
  • US2004/0017738 discloses a method wherein the removal of a CD-rom from a computer us possible only after a successful input of a password. Bank teller machines prohibiting the removal of a bank card after too many failed identification number input attemtps by the user have been known at the time of filing of present application.
  • the present invention provides a method and apparatus for securing data on a removable memory device as claimed in the appendant claims.
  • a removable memory device which is removably coupled to and accessible by a computing apparatus is disclosed.
  • a manual key is recovered by a manual key interface device. This manual key is used to authenticate the identity of the user.
  • the access is enabled.
  • the access is prohibited.
  • a "manual key interface” may include but is not limited to any type of manually-operated or manipulated device that produces a signal, state, output, etc., which can be correlated to a user's identity, condition, proximity, presence, etc.
  • a “mechanical access device” may include but is not limited to any type of mechanical, electro-mechanical, hydraulic, pneumatic, etc device that can effectively latch, contain, constrain, or prohibit physical movement between at least two components.
  • Embodiments of the present invention provide an apparatus, system, and a method for securing access to a removable memory device.
  • security is established by a manual key interface, manually activated with a manual key corresponding to a user provided by a user. The key is used to effectively identify the user, the user's proximity, and establish the data access permissions.
  • the removable memory device is secured by controlling the electronic signals between the removable memory device and the data processing apparatus it is attached to, effectively preventing unauthorized access.
  • the removable memory device is secured by physically constraining the removable memory device within the data processing apparatus, effectively preventing the removal of the removable memory device.
  • An embodiment of the present invention provides a computer-implemented method for controlling access to a removable memory device
  • embodiments of the present invention provide an increased level of security over present electronic or software-based password and data encryption methods; permitting access to a removable memory device to an authorized user and preventing access to a removable memory device to a user who is not an authorized accessor. Also, embodiments of the present invention employ a manual key interface to eliminate the use of electronic passwords and the inherent security weaknesses posed by password attacks therein. Further, embodiments of the present invention can prohibit access to any aspect of the user data in the absence of proper authorization and permission, thereby eliminating the weakness of cryptographic data protection schemes.
  • FIG. 1 depicts a functional block diagram of an exemplary data processing apparatus according to an embodiment of the present invention.
  • Processor 121 is connected by data bus 150 to chipset 122.
  • Chipset 122 provides data interconnection paths and access arbitration to the other peripheral components of the data processing apparatus.
  • Main volatile memory bank 123 is connected to chipset 122 via memory bus 155.
  • Expansion slots, one of which is denoted 153, are connected to the chipset via expansion bus 154.
  • Video adapter board 124 is attached to expansion slot 153 and drives video monitor 140 via video cable 157 to provide user output.
  • Keyboard 158 is connected to chipset 122 via cable156 for user input.
  • Interface connector 125 is connected to chipset 122 via data interconnect bus 152.
  • Removable memory device 126 is removably coupled with interface 125.
  • Interface 125 provides bi-directional data, device control, bus control, and power source to removable memory device 126.
  • Chipset 122 is attached to expansion bus 151, which carries bi-directional data, device control, bus control, and power source to non-removable, non-volatile storage 129.
  • Expansion bus 151 also carries bi-directional data, device control, bus control, and power source to interface 127.
  • Removable memory device 128 is removably coupled with interface 127.
  • Interface 127 provides any combination of bi-directional data, device control, bus control, and power source to removable memory device 128.
  • FIG. 2 depicts a functional block diagram of an exemplary data securing apparatus according to an embodiment of the present invention.
  • removable memory device 200 is removably coupled to the host data processing apparatus 224 via interface 222 and expansion bus 223.
  • Interface 222 may provide any combination of mechanical, electrical power, data, and device control functions to removable memory device 200.
  • Removable memory device 200 comprises memory device 220, which stores user data.
  • Memory device 220 is connected to electronic access controller 226 via digital bus 221.
  • Electronic access controller 226 performs a switch function selectively permitting or prohibiting data transfer between the host data processing apparatus interface 222 and memory device 220 via removable memory device interface connector 225, subject to control signals from security processor 230 via control bus 227.
  • Manual key interface 228 is manually activated with a key corresponding to a user provided by a user for use by security processor 230.
  • Manual key interface 228 is electrically coupled to and communicates with security processor 230 via interconnect bus 229.
  • Security processor 230 controls electronic access controller 226 via control bus 227 to permit or prohibit access to memory device 220 via digital bus 221 in accordance with a suitable algorithm, e.g. the System 4 described in Figure 4 and Method 500 in Figure 5 .
  • memory device 220 can have any shape, size, configuration, orientation, etc., and can consist of any kind of memory device, disk drive, circuitry, electronic apparatus, etc.
  • Figure 3 depicts a functional block diagram of an exemplary removable memory device securing apparatus according to an embodiment of the present invention.
  • interface 321 is physically attached to the host data processing apparatus 322 and may provide any combination of mechanical, electrical power, data, and device control functions to removable memory device 319, via interconnect 323 and host interconnect 324.
  • Removable memory device 319 is removably coupled to host data processing apparatus 322 via interface 321.
  • Removable memory device 319 comprises memory device 320, wherein user data is stored, and host interconnect 324 which conveys any combination of device control, electrical power, data, or mechanical coupling to the interface 321.
  • Mechanical constraining device 326 is controlled by access controller 327 and has an interference coupling with removable memory device 319, selectively preventing removal of removable memory device 319 in the direction denoted by arrow 325.
  • Manual key interface 331 is manually activated with a key corresponding to a user from a user for use by security processor 329.
  • Manual key interface 331 is electrically coupled to and communicates with security processor 329 by interconnect bus 330.
  • Security processor 329 obtains manual key aspects from manual key interface 331 via interconnect bus 330 and controls electronic access controller 327 via interconnect bus 328.
  • Security processor 329 performs a suitable algorithm, e.g. System 4 described in Figure 4 and Method 500 in Figure 5 , to control access controller 327.
  • Access controller 327 is controlled by security processor 329 to either permit or prohibit access to removable memory device 319.
  • When instructed to permit, access controller 327 positions mechanical constraining device 326 to permit removal of removable memory device 319 in the direction indicated by arrow 325.
  • When instructed to prohibit, access controller 327 positions mechanical constraining device 326 to constrain removal of removable memory device 319 in the direction indicated by arrow 325.
  • mechanical constraining device 326 functions to effectively constrain removable memory device 319 and not allow removable memory device 319 to be removed from host data processing apparatus 322 without permanent, irreparable damage to removable memory device 319 with the ultimate effect of rendering removable memory device 319 unusable and inert. Hence, removable memory device 319 is secured.
  • the memory device exemplified herein with reference to memory device 320 can have any shape, size, configuration, orientation, etc., and can consist of any kind of memory device, disk drive, circuitry, electronic apparatus, etc.
  • embodiments of the present invention may be practiced with functionality, exemplified herein with reference to mechanical restraining device 326, access controller 327, security processor 329, and manual key interface 331, wherein the listed components are positioned, configured, oriented, etc. in such a way that the location of any or all of mechanical restraining device 326, access controller 327, security processor 329, or manual key interface 331 is not limited to attachment to the host data processing apparatus 322, nor to the removable memory device 319.
  • any or all of mechanical restraining device 326, access controller 327, security processor 329, or manual key interface 331 may be positioned, configured, oriented, etc in a variety of ingenious positions, configurations, orientations, etc, according to an embodiment of the present invention.
  • FIG. 4 depicts an exemplary removable memory securing system according to the present invention.
  • Access request message 431 notifies security coordination module 426 of a pending access request, initiating a user authentication and verification method, e.g. Method 500 as described in Figure 5 .
  • Security coordination module 426 coordinating the steps of the security verification method, dispatches identity request message 425 to identity verification module 412.
  • Identity verification module 412 activates manual key interface 410 via link 411.
  • Manual key interface device 410 dispatches key value message 434 to identity verification module 412.
  • Data conveyed by key value message 434 conveys some state of manual key interface 410 that is correlated with some aspect of a user interfacing with manual key interface device 410.
  • manual key interface device 410 dispatches key value message 434 conveying a password. In another embodiment, manual key interface device 410 dispatches key value message 434 conveying a description of a user's identity. It is appreciated that the present invention may be practiced, with respect to manual key interface device 410, with a variety of manual data entry devices, e.g. tumblers, dials, switches, pushbuttons, magnetic sensors, traditional pin-tumbler lock keys, etc, as is appropriate for the type of access control that is desired.
  • manual data entry devices e.g. tumblers, dials, switches, pushbuttons, magnetic sensors, traditional pin-tumbler lock keys, etc, as is appropriate for the type of access control that is desired.
  • Identity verification module 412 processes the data conveyed via key value message 434 and dispatches a user identity message 425 to security coordination module 426.
  • Data conveyed by user identity message 425 conveys some aspect of the user's identity.
  • Security coordination module 426 dispatches permission request message 428 to permission verification module 421.
  • Data conveyed by permission request message 428 conveys some aspect of some combination of any or all of an aspect of the access request, an aspect of the user's identity, an aspect of memory device 435's state, or any other condition, state, status, input, etc.
  • Permission verification module 421 processes data conveyed by permission request message 428 and dispatches a permission status message 422 to security coordination module 426.
  • Data conveyed by permission status message 422 conveys some aspect of the permissions attributable to said user interfacing with manual key interface device 410.
  • Security coordination module 426 processes any or all of data conveyed by permission status message 422, user identity message 425, access request message 431, access request message 427, or any other condition, state, status, input, data, etc then dispatches access control message 423 to access control device 424.
  • Data conveyed by access control message 423 comprises some aspect of permitting or prohibiting access to memory device 435.
  • Access control device 424 either permits or prohibits access to removable memory device 435 based on some aspect of the data conveyed by access control message 423.
  • Access control device 424 can consist of an electronic data switch, electro-mechanical latch, electro-hydraulic securing mechanism, or any other mechanism that will effectively permit or prohibit access to some aspect of memory device 435.
  • Data conveyed by access control message 423 instructs access control module 424 to set itself in the "permit” or "prohibit” state, thereby selectively securing access control to removable memory device 435.
  • Access control device 424 receives access control message 423 from security coordination module 426.
  • access control device 424 may dispatch access request message 427, e.g. upon an attempt to physically remove the protected removable memory device 435.
  • Access request message 427 notifies security coordination module 426 of a pending access request, initiating a user authentication and verification method, e.g. Method 500 as described in Figure 5 .
  • access control device 424 may be practiced, with respect to access control device 424, with a variety of mechanisms, components, systems, or devices that will effectively permit or deny access to some aspect of memory device 435.
  • Figure 5 is a flowchart of an exemplary method 500 for securing access to a removable memory device using an embodiment of the present invention.
  • a request is made to access a removable memory device.
  • the request can include attempts or requests to perform any or all of: reading data, writing data, modifying data, deleting data, accessing device control functions, removal of the memory device, or any other action.
  • Step 503 a manually entered key is obtained from a manual key interface activated with a data from a user.
  • Step 504 the security system correlates the manual key with a unique individual.
  • Step 505 the access permission module determines the access permission of the user identified in Step 504. If the identified user authorization for the requested access is determined to be "authorized” step 510 is executed. If the user is not in the "authorized” list, Step 511 is executed.
  • Step 510 an authorized user is given access to the removable memory device.
  • Step 512 an indication is provided to indicate access is permitted.
  • Step 511 a non-authorized user is not given access to the removable memory device.
  • Step 514 an indication is provided to indicate access is prohibited.
  • flow chart 500 shows a specific sequence of steps characteristic of one embodiment, other embodiments of the present invention are well suited to function with more or fewer steps. Likewise, the sequences of steps in various such embodiments can vary from those exemplified with process 500, e.g., depending upon the application.
  • access may refer to electronic signals, mechanical displacement, or any other operation that could modify or change the state of any aspect of the removable memory device.
  • indicate may refer to any type of indicator useful to the function of the removable memory device, including any or all of visual indicators, audible indicators, electronic signals, etc.
  • Figure 6 depicts an exemplary removable storage device according to an embodiment of the present invention, in a view to demonstrate an exemplary configuration of certain components.
  • removable memory device 610 has a handle 625 to facilitate removal in the direction denoted by arrow 617 and has a security processor 620, located within housing 615, an electronic access controller 621, located within housing 615, and a manual key interface device 645 which is manually activated with data corresponding to a user.
  • the manual key interface output and state corresponds to a pattern and sequence applied to one or more of pressure-sensitive switches 630, 631, 632, and 633.
  • Host data processing apparatus 611 possess a removable memory interfaced connector 612, which conveys any combination of device control, electrical power, data, or mechanical coupling to removable memory device 610's host data processing apparatus interface 614.
  • Removable memory device 610 is removably attachable to removable memory interfaced connector 612, and can be separated from removable memory interfaced connector 612 in the direction denoted by arrow 617.
  • Manual key interface device 645 provides means for a user to supply a data to security processor 620, which controls electronic access controller 621 and status indicator 629.
  • Security processor 620 controls electronic access controller 621 to allow or deny access to memory 622 in accordance with a suitable method, e.g. the System 4 described in Figure 4 and Method 500 in Figure 5 .
  • Security processor 620 also controls status indicator 629 to indicate an aspect of the current state of removable memory device 610, e.g. whether access controller 612 is in the permit or prohibit state.
  • memory device 622 can have any shape, size, configuration, orientation, etc., and can consist of any kind of memory device, circuitry, electronic apparatus, etc.
  • manual key interface 645 may be positioned, configured, oriented, etc. in such a way that the location of manual key interface 645 is not limited to a particular attachment to housing 615.
  • manual key interface 645 may be positioned, configured, oriented, etc in a variety of ingenious positions, configurations, orientations, etc, according to an embodiment of the present invention.
  • manual key interface 645 may respond and operate with one or more of a variety of manual signals or manipulations, including, but not limited to: knobs, pushbuttons, capacitive sensing devices, touch screens, temperature sensors, dials, etc.
  • Figure 7 depicts an exemplary removable storage device according to an embodiment of the present invention, in a view to demonstrate an exemplary configuration of certain components.
  • removable memory device 710 has a housing 745, a manual entry device 740 consisting of status indicator 722 and manual key input thumbwheels 724, 726, 728, and 730.
  • Manual key interface 740 recovers a manually entered key from a user for use by security processor 732, hence security processor 732 receives aspects of a manual key from manual key interface 740.
  • Manual key interface 740 is electrically coupled to and communicates with security processor 732.
  • Security processor 732 controls electronic access controller 734 to allow or deny access to memory device 720 in accordance with a suitable algorithm, e.g. the System 4 described in Figure 4 and Method 500 in Figure 5 .
  • Security processor 732 also controls status indicator 722 to indicate an aspect of the current state of removable memory device 710, e.g. whether access controller 734 is in the permit or prohibit state.
  • memory device exemplified herein with reference to memory device 720 can have any shape, size, configuration, orientation, etc., and can consist of any kind of memory device, disk drive, circuitry, electronic apparatus, etc.
  • manual key interface 740 may be practiced with functionality, exemplified herein with reference to manual key interface 740, wherein the manual key interface 740 is positioned, configured, oriented, etc. in such a way that the location of manual key interface 740 is not limited to a particular attachment to housing 745.
  • manual key interface 740 may be positioned, configured, oriented, etc in a variety of ingenious positions, configurations, orientations, etc, according to an embodiment of the present invention.
  • manual key interface 740 may respond or operate with one or more of a variety of manual signals or manipulatable features, including, but not limited to: knobs, pushbuttons, capacitive sensing devices, touch screens, temperature sensors, dials, etc.
  • Figure 8 depicts an exemplary manual key interface according to an embodiment of the present invention.
  • Exemplary manual key interface 730 has pressure sensitive membrane switches 740, 742, 744, and 746. Each or any of pressure sensitive membrane switches 740, 742, 744, and 746 may be labeled with a designating letter or numeral.
  • Status indicator 750 provides visual feedback to a user, indicating some aspect of a status, said status representing some aspect of a removable memory device that might be valuable to a user.
  • Interconnect port 760 provides a means to supply any combination or selection of power, status signals, data interconnections, etc, as required by the specific application of manual key interface 730.
  • manual key interface 730 may respond to or operate with one or more of a variety of manual signals or manipulatable features, including, but not limited to: knobs, pushbuttons, capacitive sensing devices, touch screens, temperature sensors, dials, etc.
  • status indicator 750 may include any combination of one or more visual indicators, e.g. light emitting diode, mechanical flag, liquid crystal display, etc, and audible indicators, e.g. buzzer, oscillator, etc.
  • FIG. 9 depicts an exemplary removable memory device security adapter apparatus according to an embodiment of the present invention.
  • Removable memory device adapter apparatus 900 is illustrated in the "closed” or “secured” condition.
  • Host data processing apparatus interface connector 955 is part of the host data processing apparatus 954, and serves as the host data processing apparatus 954's access to the removable memory device.
  • the removable memory device adapter apparatus 900 comprises a standard removable memory device 950, e.g. USB Thumb Drive, effectively contained and constrained by outer housing 951 and inner housing 959.
  • the standard removable memory device interface connector 956 engages interface connector 957.
  • Interface connector 957 communicates the bi-directional power, control, and data signals between the removable memory device 950 and the host data processing apparatus interface connector 955, subject to the state of electronic access controller 971.
  • Electronic access controller 971 performs a switching function selectively permitting or prohibiting data transfer between the host data processing apparatus interface and the standard removable memory device 950, subject to control signals from security processor 953 via control bus 970.
  • Latch 964 performs a latching function, mechanically securing outer housing 951 to inner housing 959 in the closed position, subject to control signals from security processor 953 via control bus 963. When instructed by security processor 953, latch 964 permits outer housing 951 to be extended away from inner housing 959 in the direction indicated by arrow 960.
  • Manual key interface 952 recovers a manually entered key provided by a user corresponding to said user for use by security processor 953.
  • Manual key interface 952 is electrically coupled to and communicates with security processor 953 by a power and data bus 962.
  • Security processor 953, controls latch 964 via control bus 963 and electronic access controller 971 via control bus 970 to allow or deny access to standard removable memory device 950 in accordance with a suitable algorithm, e.g. System 4 described in Figure 4 and Method 500 described in Figure 5 .
  • standard memory device 950 cannot be removed from removable memory device security adapter apparatus 900 without permanent, irreparable damage to standard removable memory device 950 with the ultimate effect of rendering standard removable memory device 950 unusable and inert. It is also appreciated that as long as electronic access controller 971 remains in the "prohibit" function, as instructed by security processor 953, no access to standard removable memory device 950 is possible. It is further appreciated that the standard removable memory device exemplified herein with reference to standard removable memory device 950 can have any shape, size, configuration, orientation, etc., and can house any kind of memory device, circuitry, electronic apparatus, etc.
  • FIG 10 depicts a view exemplary removable memory device security adapter apparatus 900 according to an embodiment of the present invention.
  • the depicted device is identical in construction to removable memory device security adapter apparatus 900 depicted in Figure 9 .
  • security processor 953 has positioned latch 964 such that outer housing 951 is no longer constrained with respect to inner housing 959. Therefore outer housing 951 can be moved in the direction indicated by arrow 960. Since outer housing 951 can be extended away from inner housing 959, it no longer constrains or restrains standard removable memory device 950. Standard removable device 950 may now be removed from the removable memory device security adapter apparatus 900 and accessed using normal, non-secure methods.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Description

    TECHNICAL FIELD
  • An embodiment of the present invention relates to the field of data protection for computer memory systems. More specifically, embodiments of the present invention relate to providing secure and controlled access to removable memory devices and controlling access to removable memory devices on the basis of a manually entered security key.
  • BACKGROUND
  • Removable memory devices are found in a wide variety of data-processing systems. Not only traditional data-processing devices such as laptop computers, but other digital equipment such as hand-held computing devices, cameras, personal digital assistants, video gaming consoles, digital video recorders, digital entertainment equipment, and calculators may include hardware, software, and operating system support for removable memory devices.
  • In the past, removable memory devices were limited to relatively small capacity, low performance solid-state devices, such as flash memory cards. But with improvements in rotating magnetic storage technology, practical and affordable removable disk drive designs have become common. These removable memory devices offer substantial improvements in capacity, performance, and practicality. In addition, advances in digital technology have increased the storage capacity available in a practical removable solid-state memory device. Finally, emerging technologies promise grater capacities with better performance and lower costs aimed at the portable and emovable storage markets.
  • As capacity, performance, and usefulness of removable memory devices continue to improve, many data processing systems have begun to ely on removable memory devices for the majority of the system's non-volatile storage. Even large desktop computing systems employ removable memory devices to facilitate data portability between systems. For example; a user can carry large quantities of data from home to work, or while traveling, increasing productivity. Other uses include archiving data, and storing digital entertainment data, such as video or music, for use later.
  • One result of these advances in removable and portable memory devices is that users tend to store much more data on removable memory devices. As removable memory device reliability has improved, a larger quantity of mission-critical or sensitive data is being stored on removable memory devices. Furthermore, as the devices have become smaller, more desirable, and more common it is inevitable that a larger number of them are eventually possessed by persons who do not own nor have permission to access the data on the removable memory devices in their possession.
  • While having large quantities of data easily portable and available is advantageous to the intended users, the potentially sensitive nature, personal aspects, and financial value of the data that may be stored on a removable storage device make it essential that the data remain secure, even if the removable memory device is not in an authorized user's possession.
  • Traditionally, access to data has been restricted by a combination of password controls and encryption. But software-based passwords and encryption are often inadequate, because the high performance data interface that makes these devices attractive to customers also enables high-speed attacks. Password attacks can be as simple as a computer program that attempts every possible password. The password attack, in particular, is dependent on a high-speed electronic access to the password mechanism to allow an automated, brute force attack. Encryption attacks are based on mathematical analysis of encrypted data, so a security method that allows access to the encrypted user data also facilitates the encryption attack.
  • Therefore, what is needed is a means to provide greater security without the potential weakness of a software-based password system or encryption system that will keep the data stored on the removable memory device secure any time it is not in an authorized user's possession. What is needed is a secure password method that is not easily susceptible to a brute force password attack. Additionally, what is needed is a security system that restricts any type of access to the user data, whether encrypted or not, in the absence of proper authorization and permission.
  • WO 00/42491 discloses a compact, self-contained, personal key. The personal key comprises a USB-compliant interface releasably coupleable to a host processing device; a memory; and a processor. The processor provides the host processing device conditional access to data storable in the memory as well as the functionality required to manage files stored in the personal key and for performing computations based on the data in the files. In one embodiment, the personal key also comprises an integral user input device and an integral user output device. The input and output devices communicate with the processor by communication paths which are independent from the USB-compliant interface, and thus allow the user to communicate with the processor without manifesting any private information external to the personal key. EP 1557741 discloses an information storage device that comprises a password input section for inputting a password to be notified only to the information storage device without outputting it to external equipment connected to it by way of a predetermined interface, a password collation section for collating the password input by way of the password input section and an access permission section for permitting an access to the storage section of the device from the external equipment connected by way of the predetermined interface in response to the collation of the password by the password collation section. US2004/0017738 discloses a method wherein the removal of a CD-rom from a computer us possible only after a successful input of a password. Bank teller machines prohibiting the removal of a bank card after too many failed identification number input attemtps by the user have been known at the time of filing of present application.
  • SUMMARY
  • The present invention provides a method and apparatus for securing data on a removable memory device as claimed in the appendant claims.
  • A removable memory device, which is removably coupled to and accessible by a computing apparatus is disclosed. Upon an attempt by a user to access the removable memory device, a manual key is recovered by a manual key interface device. This manual key is used to authenticate the identity of the user. Upon the authentication where the user identity corresponds to authorized access to the memory device, the access is enabled. Upon the authentication, where the user identity does not correspond to authorized access to the memory device, the access is prohibited.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention. These drawings depict exemplary embodiments and are not meant to limit the present invention. For instance, Figure 1 is not to be interpreted as limiting the invention to a personal computer data processing apparatus. The drawings are not to scale.
    • Figure 1 depicts an exemplary data processing apparatus in accordance with one embodiment of the present invention.
    • Figure 2 is a functional block diagram depicting an exemplary removable memory device with an apparatus for securing electronic data access based on a manual key according to an embodiment of the present invention.
    • Figure 3 is a functional block diagram depicting an exemplary removable memory device with an apparatus for securing physical access based on a manual key according to an embodiment of the present invention.
    • Figure 4 depicts an exemplary removable memory device security system having a security processor, a manual key interface, and an access controller according to an embodiment of the present invention.
    • Figure 5 is a flowchart of an exemplary process for securing a removable memory device from access by an unauthorized user according to an embodiment of the present invention.
    • Figure 6 shows an exemplary removable memory device having a security processor, an electronic access controller, and a pressure sensitive switch manual key interface in accordance with an embodiment of the present invention.
    • Figure 7 shows an exemplary removable memory device having a security processor, an electronic access controller, and a thumbwheel manual key interface in accordance with an embodiment of the present invention.
    • Figure 8 depicts aspects of an exemplary manual key interface memory device employing a pressure sensitive switch matrix in accordance with an embodiment of the present invention.
    • Figure 9 depicts an exemplary removable memory device having a security processor, mechanical access controller, electronic access controller, manual key interface and an industry-standard removable memory device in a "secured" mode in accordance with an embodiment of the present invention.
    • Figure 10 depicts an exemplary removable memory device having a security processor, mechanical access controller, electronic access controller, manual key interface and an industry-standard removable memory device an "accessible" mode in accordance with an embodiment of the present invention.
    DETAILED DESCRIPTION
  • A method, apparatus, and system for securing access to a removable memory device are described herein. Reference is now made in detail to exemplary embodiments of the invention, examples of which are illustrated in the accompanying drawing figures. While the invention is described herein in conjunction with these exemplary embodiments, this description is not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the scope of the invention as defined by the appended claims.
  • Furthermore, in the following detailed description of exemplary embodiments of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, one of ordinary skill in the art will realize that embodiments of the present invention may be practiced without these specific details. In other instances, well-known devices, circuits, methods, processes, procedures, systems, components, and apparatus, etc. have not been described in detail so as not to unnecessarily obscure aspects of the present invention.
  • In particular, a "manual key interface" may include but is not limited to any type of manually-operated or manipulated device that produces a signal, state, output, etc., which can be correlated to a user's identity, condition, proximity, presence, etc. Further, a "mechanical access device" may include but is not limited to any type of mechanical, electro-mechanical, hydraulic, pneumatic, etc device that can effectively latch, contain, constrain, or prohibit physical movement between at least two components.
  • A portion of the detailed description that follows is presented and discussed in terms of a method. Although steps and sequencing thereof are disclosed in a figure herein (e.g., Figure 5) describing the operations of this method (e.g., process 500), such steps and sequencing are exemplary. Embodiments of the present invention are well suited to performing various other steps or variations of the steps recited in the flowchart of the figure herein, and in a sequence other than that depicted and described herein.
  • Embodiments of the present invention provide an apparatus, system, and a method for securing access to a removable memory device. In one embodiment, security is established by a manual key interface, manually activated with a manual key corresponding to a user provided by a user. The key is used to effectively identify the user, the user's proximity, and establish the data access permissions. In one embodiment the removable memory device is secured by controlling the electronic signals between the removable memory device and the data processing apparatus it is attached to, effectively preventing unauthorized access. In one embodiment the removable memory device is secured by physically constraining the removable memory device within the data processing apparatus, effectively preventing the removal of the removable memory device. An embodiment of the present invention provides a computer-implemented method for controlling access to a removable memory device
  • Therefore, embodiments of the present invention provide an increased level of security over present electronic or software-based password and data encryption methods; permitting access to a removable memory device to an authorized user and preventing access to a removable memory device to a user who is not an authorized accessor. Also, embodiments of the present invention employ a manual key interface to eliminate the use of electronic passwords and the inherent security weaknesses posed by password attacks therein. Further, embodiments of the present invention can prohibit access to any aspect of the user data in the absence of proper authorization and permission, thereby eliminating the weakness of cryptographic data protection schemes.
  • EXEMPLARY DATA PROCESSING APPARATUS WITH REMOVABLE MEMORY
  • Figure 1 depicts a functional block diagram of an exemplary data processing apparatus according to an embodiment of the present invention. Processor 121 is connected by data bus 150 to chipset 122. Chipset 122 provides data interconnection paths and access arbitration to the other peripheral components of the data processing apparatus. Main volatile memory bank 123 is connected to chipset 122 via memory bus 155. Expansion slots, one of which is denoted 153, are connected to the chipset via expansion bus 154. Video adapter board 124 is attached to expansion slot 153 and drives video monitor 140 via video cable 157 to provide user output. Keyboard 158 is connected to chipset 122 via cable156 for user input. Interface connector 125, is connected to chipset 122 via data interconnect bus 152. Removable memory device 126 is removably coupled with interface 125. Interface 125 provides bi-directional data, device control, bus control, and power source to removable memory device 126. Chipset 122 is attached to expansion bus 151, which carries bi-directional data, device control, bus control, and power source to non-removable, non-volatile storage 129. Expansion bus 151 also carries bi-directional data, device control, bus control, and power source to interface 127. Removable memory device 128 is removably coupled with interface 127. Interface 127 provides any combination of bi-directional data, device control, bus control, and power source to removable memory device 128.
  • EXEMPLARY ELECTRONIC REMOVABLE MEMORY SECURING APPARATUS
  • Figure 2 depicts a functional block diagram of an exemplary data securing apparatus according to an embodiment of the present invention. In this example, removable memory device 200 is removably coupled to the host data processing apparatus 224 via interface 222 and expansion bus 223. Interface 222 may provide any combination of mechanical, electrical power, data, and device control functions to removable memory device 200.
  • Removable memory device 200 comprises memory device 220, which stores user data. Memory device 220 is connected to electronic access controller 226 via digital bus 221. Electronic access controller 226 performs a switch function selectively permitting or prohibiting data transfer between the host data processing apparatus interface 222 and memory device 220 via removable memory device interface connector 225, subject to control signals from security processor 230 via control bus 227.
  • Manual key interface 228 is manually activated with a key corresponding to a user provided by a user for use by security processor 230. Manual key interface 228 is electrically coupled to and communicates with security processor 230 via interconnect bus 229. Security processor 230 controls electronic access controller 226 via control bus 227 to permit or prohibit access to memory device 220 via digital bus 221 in accordance with a suitable algorithm, e.g. the System 4 described in Figure 4 and Method 500 in Figure 5.
  • It is appreciated that as long as electronic access controller 226 remains in the "prohibit" function, as instructed by security processor 230, no access to memory device 220 is possible. It is further appreciated that the memory device exemplified herein with reference to memory device 220 can have any shape, size, configuration, orientation, etc., and can consist of any kind of memory device, disk drive, circuitry, electronic apparatus, etc.
  • EXEMPLARY MECHANICAL REMOVABLE MEMORY SECURING APPARATUS
  • Figure 3 depicts a functional block diagram of an exemplary removable memory device securing apparatus according to an embodiment of the present invention. In this example, interface 321 is physically attached to the host data processing apparatus 322 and may provide any combination of mechanical, electrical power, data, and device control functions to removable memory device 319, via interconnect 323 and host interconnect 324. Removable memory device 319 is removably coupled to host data processing apparatus 322 via interface 321.
  • Removable memory device 319 comprises memory device 320, wherein user data is stored, and host interconnect 324 which conveys any combination of device control, electrical power, data, or mechanical coupling to the interface 321. Mechanical constraining device 326 is controlled by access controller 327 and has an interference coupling with removable memory device 319, selectively preventing removal of removable memory device 319 in the direction denoted by arrow 325.
  • Manual key interface 331 is manually activated with a key corresponding to a user from a user for use by security processor 329. Manual key interface 331 is electrically coupled to and communicates with security processor 329 by interconnect bus 330. Security processor 329 obtains manual key aspects from manual key interface 331 via interconnect bus 330 and controls electronic access controller 327 via interconnect bus 328. Security processor 329 performs a suitable algorithm, e.g. System 4 described in Figure 4 and Method 500 in Figure 5, to control access controller 327. Access controller 327 is controlled by security processor 329 to either permit or prohibit access to removable memory device 319. When instructed to permit, access controller 327 positions mechanical constraining device 326 to permit removal of removable memory device 319 in the direction indicated by arrow 325. When instructed to prohibit, access controller 327 positions mechanical constraining device 326 to constrain removal of removable memory device 319 in the direction indicated by arrow 325.
  • It is appreciated that as long as mechanical controller 327 remains in the "prohibit" function state, as instructed by security processor 329, mechanical constraining device 326 functions to effectively constrain removable memory device 319 and not allow removable memory device 319 to be removed from host data processing apparatus 322 without permanent, irreparable damage to removable memory device 319 with the ultimate effect of rendering removable memory device 319 unusable and inert. Hence, removable memory device 319 is secured. It is also appreciated that the memory device exemplified herein with reference to memory device 320 can have any shape, size, configuration, orientation, etc., and can consist of any kind of memory device, disk drive, circuitry, electronic apparatus, etc.
  • It is further appreciated that embodiments of the present invention may be practiced with functionality, exemplified herein with reference to mechanical restraining device 326, access controller 327, security processor 329, and manual key interface 331, wherein the listed components are positioned, configured, oriented, etc. in such a way that the location of any or all of mechanical restraining device 326, access controller 327, security processor 329, or manual key interface 331 is not limited to attachment to the host data processing apparatus 322, nor to the removable memory device 319. In fact, any or all of mechanical restraining device 326, access controller 327, security processor 329, or manual key interface 331 may be positioned, configured, oriented, etc in a variety of ingenious positions, configurations, orientations, etc, according to an embodiment of the present invention.
  • EXEMPLARY REMOVABLE MEMORY SECURING SYSTEM
  • Figure 4 depicts an exemplary removable memory securing system according to the present invention. Access request message 431 notifies security coordination module 426 of a pending access request, initiating a user authentication and verification method, e.g. Method 500 as described in Figure 5. Security coordination module 426, coordinating the steps of the security verification method, dispatches identity request message 425 to identity verification module 412. Identity verification module 412 activates manual key interface 410 via link 411. Manual key interface device 410 dispatches key value message 434 to identity verification module 412. Data conveyed by key value message 434 conveys some state of manual key interface 410 that is correlated with some aspect of a user interfacing with manual key interface device 410. In one embodiment manual key interface device 410 dispatches key value message 434 conveying a password. In another embodiment, manual key interface device 410 dispatches key value message 434 conveying a description of a user's identity. It is appreciated that the present invention may be practiced, with respect to manual key interface device 410, with a variety of manual data entry devices, e.g. tumblers, dials, switches, pushbuttons, magnetic sensors, traditional pin-tumbler lock keys, etc, as is appropriate for the type of access control that is desired.
  • Identity verification module 412 processes the data conveyed via key value message 434 and dispatches a user identity message 425 to security coordination module 426. Data conveyed by user identity message 425 conveys some aspect of the user's identity. Security coordination module 426 dispatches permission request message 428 to permission verification module 421. Data conveyed by permission request message 428 conveys some aspect of some combination of any or all of an aspect of the access request, an aspect of the user's identity, an aspect of memory device 435's state, or any other condition, state, status, input, etc. Permission verification module 421 processes data conveyed by permission request message 428 and dispatches a permission status message 422 to security coordination module 426. Data conveyed by permission status message 422 conveys some aspect of the permissions attributable to said user interfacing with manual key interface device 410.
  • Security coordination module 426 processes any or all of data conveyed by permission status message 422, user identity message 425, access request message 431, access request message 427, or any other condition, state, status, input, data, etc then dispatches access control message 423 to access control device 424. Data conveyed by access control message 423 comprises some aspect of permitting or prohibiting access to memory device 435.
  • Access control device 424 either permits or prohibits access to removable memory device 435 based on some aspect of the data conveyed by access control message 423. Access control device 424 can consist of an electronic data switch, electro-mechanical latch, electro-hydraulic securing mechanism, or any other mechanism that will effectively permit or prohibit access to some aspect of memory device 435. Data conveyed by access control message 423 instructs access control module 424 to set itself in the "permit" or "prohibit" state, thereby selectively securing access control to removable memory device 435.
  • Access control device 424 receives access control message 423 from security coordination module 426. In one embodiment, access control device 424 may dispatch access request message 427, e.g. upon an attempt to physically remove the protected removable memory device 435. Access request message 427 notifies security coordination module 426 of a pending access request, initiating a user authentication and verification method, e.g. Method 500 as described in Figure 5.
  • It is appreciated that the present invention may be practiced, with respect to access control device 424, with a variety of mechanisms, components, systems, or devices that will effectively permit or deny access to some aspect of memory device 435.
  • EXEMPLARY REMOVABLE MEMORY SECURING METHOD
  • Figure 5 is a flowchart of an exemplary method 500 for securing access to a removable memory device using an embodiment of the present invention.
  • In Step 502, a request is made to access a removable memory device. The request can include attempts or requests to perform any or all of: reading data, writing data, modifying data, deleting data, accessing device control functions, removal of the memory device, or any other action.
  • In Step 503, a manually entered key is obtained from a manual key interface activated with a data from a user.
  • In Step 504 the security system correlates the manual key with a unique individual.
  • In Step 505, the access permission module determines the access permission of the user identified in Step 504. If the identified user authorization for the requested access is determined to be "authorized" step 510 is executed. If the user is not in the "authorized" list, Step 511 is executed.
  • In Step 510, an authorized user is given access to the removable memory device.
  • In Step 512, an indication is provided to indicate access is permitted.
  • In Step 511, a non-authorized user is not given access to the removable memory device.
  • In Step 514, an indication is provided to indicate access is prohibited.
  • While flow chart 500 shows a specific sequence of steps characteristic of one embodiment, other embodiments of the present invention are well suited to function with more or fewer steps. Likewise, the sequences of steps in various such embodiments can vary from those exemplified with process 500, e.g., depending upon the application.
  • It is appreciated that the term "access", as described in Method 500, steps 502, 511, and 512, may refer to electronic signals, mechanical displacement, or any other operation that could modify or change the state of any aspect of the removable memory device.
  • Also, it is appreciated that the term "indicate", as described in Method 500, steps 512 and 514, may refer to any type of indicator useful to the function of the removable memory device, including any or all of visual indicators, audible indicators, electronic signals, etc.
  • EXEMPLARY REMOVABLE MEMORY SECURING APPARATUS WITH MANUAL KEY ENTRY
  • Figure 6 depicts an exemplary removable storage device according to an embodiment of the present invention, in a view to demonstrate an exemplary configuration of certain components. In this example, removable memory device 610 has a handle 625 to facilitate removal in the direction denoted by arrow 617 and has a security processor 620, located within housing 615, an electronic access controller 621, located within housing 615, and a manual key interface device 645 which is manually activated with data corresponding to a user. In this example, the manual key interface output and state corresponds to a pattern and sequence applied to one or more of pressure- sensitive switches 630, 631, 632, and 633.
  • Host data processing apparatus 611 possess a removable memory interfaced connector 612, which conveys any combination of device control, electrical power, data, or mechanical coupling to removable memory device 610's host data processing apparatus interface 614. Removable memory device 610 is removably attachable to removable memory interfaced connector 612, and can be separated from removable memory interfaced connector 612 in the direction denoted by arrow 617. Manual key interface device 645 provides means for a user to supply a data to security processor 620, which controls electronic access controller 621 and status indicator 629.
  • Security processor 620 controls electronic access controller 621 to allow or deny access to memory 622 in accordance with a suitable method, e.g. the System 4 described in Figure 4 and Method 500 in Figure 5. Security processor 620 also controls status indicator 629 to indicate an aspect of the current state of removable memory device 610, e.g. whether access controller 612 is in the permit or prohibit state.
  • It is appreciated that as long as electronic access controller 621 remains in the "prohibit" function, as instructed by security processor 620, no access to memory device 622 is possible. It is further appreciated that the memory device exemplified herein with reference to memory device 622 can have any shape, size, configuration, orientation, etc., and can consist of any kind of memory device, circuitry, electronic apparatus, etc.
  • It is also appreciated that embodiments of the present invention may be practiced with functionality, exemplified herein with reference to manual key interface 645, wherein the manual key interface 645 is positioned, configured, oriented, etc. in such a way that the location of manual key interface 645 is not limited to a particular attachment to housing 615. In fact, manual key interface 645 may be positioned, configured, oriented, etc in a variety of ingenious positions, configurations, orientations, etc, according to an embodiment of the present invention.
  • It is further appreciated that embodiments of the present invention may be practiced with functionality, exemplified herein with reference to manual key interface 645, in such a way that the nature of manual key interface 645 is not limited to an array of pressure-sensitive switches. In fact, manual key interface 645 may respond and operate with one or more of a variety of manual signals or manipulations, including, but not limited to: knobs, pushbuttons, capacitive sensing devices, touch screens, temperature sensors, dials, etc.
  • EXEMPLARY REMOVABLE MEMORY SECURING APPARATUS WITH MANUAL KEY ENTRY
  • Figure 7 depicts an exemplary removable storage device according to an embodiment of the present invention, in a view to demonstrate an exemplary configuration of certain components. In this example, removable memory device 710 has a housing 745, a manual entry device 740 consisting of status indicator 722 and manual key input thumbwheels 724, 726, 728, and 730.
  • To provide a manual key, a user manipulates manual key input thumbwheels 724, 726, 728, and 730. Manual key interface 740 recovers a manually entered key from a user for use by security processor 732, hence security processor 732 receives aspects of a manual key from manual key interface 740. Manual key interface 740 is electrically coupled to and communicates with security processor 732. Security processor 732 controls electronic access controller 734 to allow or deny access to memory device 720 in accordance with a suitable algorithm, e.g. the System 4 described in Figure 4 and Method 500 in Figure 5. Security processor 732 also controls status indicator 722 to indicate an aspect of the current state of removable memory device 710, e.g. whether access controller 734 is in the permit or prohibit state.
  • It is appreciated that as long as electronic access controller 734 remains in the "prohibit" state, as instructed by security processor 732, no access to memory device 720 is possible. It is further appreciated that the memory device exemplified herein with reference to memory device 720 can have any shape, size, configuration, orientation, etc., and can consist of any kind of memory device, disk drive, circuitry, electronic apparatus, etc.
  • It is appreciated that embodiments of the present invention may be practiced with functionality, exemplified herein with reference to manual key interface 740, wherein the manual key interface 740 is positioned, configured, oriented, etc. in such a way that the location of manual key interface 740 is not limited to a particular attachment to housing 745. In fact, manual key interface 740 may be positioned, configured, oriented, etc in a variety of ingenious positions, configurations, orientations, etc, according to an embodiment of the present invention.
  • It is further appreciated that embodiments of the present invention may be practiced with functionality, exemplified herein with reference to manual key interface 740, in such a way that the nature of manual key interface 740 is not limited to thumbwheels such as thumbwheel 724. In fact, manual key interface 740 may respond or operate with one or more of a variety of manual signals or manipulatable features, including, but not limited to: knobs, pushbuttons, capacitive sensing devices, touch screens, temperature sensors, dials, etc.
  • EXEMPLARY MANUAL KEY INTERFACE DEVICE
  • Figure 8 depicts an exemplary manual key interface according to an embodiment of the present invention. Exemplary manual key interface 730 has pressure sensitive membrane switches 740, 742, 744, and 746. Each or any of pressure sensitive membrane switches 740, 742, 744, and 746 may be labeled with a designating letter or numeral. Status indicator 750 provides visual feedback to a user, indicating some aspect of a status, said status representing some aspect of a removable memory device that might be valuable to a user. Interconnect port 760 provides a means to supply any combination or selection of power, status signals, data interconnections, etc, as required by the specific application of manual key interface 730.
  • It is appreciated that embodiments of the present invention may be practiced with functionality, exemplified herein with reference to manual key interface 730, in such a way that the nature of manual key interface 730 is not limited to a matrix of membrane switches. In fact, manual key interface 730 may respond to or operate with one or more of a variety of manual signals or manipulatable features, including, but not limited to: knobs, pushbuttons, capacitive sensing devices, touch screens, temperature sensors, dials, etc.
  • It is appreciated that embodiments of the present invention may be practiced with functionality, exemplified herein with reference to status indicator 750, in such a way that the nature of status indicator 750 is not limited to a particular notifying device. In fact, status indicator 750 may include any combination of one or more visual indicators, e.g. light emitting diode, mechanical flag, liquid crystal display, etc, and audible indicators, e.g. buzzer, oscillator, etc.
  • EXEMPLARY REMOVABLE USB MEMORY DEVICE SECURING APPARATUS
  • Figure 9 depicts an exemplary removable memory device security adapter apparatus according to an embodiment of the present invention. Removable memory device adapter apparatus 900 is illustrated in the "closed" or "secured" condition. Host data processing apparatus interface connector 955 is part of the host data processing apparatus 954, and serves as the host data processing apparatus 954's access to the removable memory device.
  • The removable memory device adapter apparatus 900 comprises a standard removable memory device 950, e.g. USB Thumb Drive, effectively contained and constrained by outer housing 951 and inner housing 959. The standard removable memory device interface connector 956 engages interface connector 957. Interface connector 957 communicates the bi-directional power, control, and data signals between the removable memory device 950 and the host data processing apparatus interface connector 955, subject to the state of electronic access controller 971. Electronic access controller 971 performs a switching function selectively permitting or prohibiting data transfer between the host data processing apparatus interface and the standard removable memory device 950, subject to control signals from security processor 953 via control bus 970.
  • Latch 964 performs a latching function, mechanically securing outer housing 951 to inner housing 959 in the closed position, subject to control signals from security processor 953 via control bus 963. When instructed by security processor 953, latch 964 permits outer housing 951 to be extended away from inner housing 959 in the direction indicated by arrow 960.
  • Manual key interface 952 recovers a manually entered key provided by a user corresponding to said user for use by security processor 953. Manual key interface 952 is electrically coupled to and communicates with security processor 953 by a power and data bus 962. Security processor 953, controls latch 964 via control bus 963 and electronic access controller 971 via control bus 970 to allow or deny access to standard removable memory device 950 in accordance with a suitable algorithm, e.g. System 4 described in Figure 4 and Method 500 described in Figure 5.
  • It is appreciated that as long as outer housing 951 remains effectively latched with respect to inner housing 959 standard memory device 950 cannot be removed from removable memory device security adapter apparatus 900 without permanent, irreparable damage to standard removable memory device 950 with the ultimate effect of rendering standard removable memory device 950 unusable and inert. It is also appreciated that as long as electronic access controller 971 remains in the "prohibit" function, as instructed by security processor 953, no access to standard removable memory device 950 is possible. It is further appreciated that the standard removable memory device exemplified herein with reference to standard removable memory device 950 can have any shape, size, configuration, orientation, etc., and can house any kind of memory device, circuitry, electronic apparatus, etc.
  • Figure 10 depicts a view exemplary removable memory device security adapter apparatus 900 according to an embodiment of the present invention. The depicted device is identical in construction to removable memory device security adapter apparatus 900 depicted in Figure 9. In this depiction, security processor 953 has positioned latch 964 such that outer housing 951 is no longer constrained with respect to inner housing 959. Therefore outer housing 951 can be moved in the direction indicated by arrow 960. Since outer housing 951 can be extended away from inner housing 959, it no longer constrains or restrains standard removable memory device 950. Standard removable device 950 may now be removed from the removable memory device security adapter apparatus 900 and accessed using normal, non-secure methods.

Claims (11)

  1. A method (500) for securing data on a removable memory device (128), comprising:
    detecting (502) an attempt by a user to electronically access said removable memory device (128) wherein said removable memory device (128) is removably coupled to a computing apparatus and accessible therewith;
    upon said attempt (502) to access said data, authenticating (504) an identity of said user, wherein said authenticating (504) comprises approving (505) a manual parameter associated with said user applied (503) to a manual key interface device of said removable memory;
    upon said authenticating (504), wherein if said user identity corresponds to authorized access to said data, access is enabled (510); and
    upon said authenticating (504), wherein if said user identity does not correspond to authorized access to said data,
    access to said data is inhibited (511), and
    physical removal (617) of said removable memory device (128) from said computing apparatus is prevented by positioning a mechanical constraining device (326, 964) to constrain the removal of said removable memory device (128).
  2. The method (500) as cited in Claim 1 wherein said access to said data is accomplished through a switch (410) apparatus that selectively controls electronic data access of said removable memory device (128) from said computing apparatus.
  3. The method (500) as cited in Claim 2 wherein said controlling (617) comprises controlling an electronic access to said data, and said electronic access comprises any combination of one or more of reading, writing, deleting, or modifying said data.
  4. The method (500) as cited in Claim 1 wherein said inhibiting (511) said access to said data comprises permanently erasing and deleting said data if said access is attempted by said user when said user is not authorized.
  5. The method (500) as cited in Claim 1 wherein said mechanical constraining device functions to effectively constrain said removable memory device and not allow said removable memory device to be removed from said computing apparatus without permanent, irreparable damage to said removable memory device with the ultimate effect of rendering said removable memory device unusable and inert.
  6. The method (500) as cited in Claim 1 wherein said authentication (504) of said user's authorization comprises:
    applying a manual authorization code (503) corresponding to said user to said manual key interface device (630-633, 724-730, 740-746);
    verifying a user's authorization based on said manual authorization code; and
    controlling access to said removable memory device based on said user's authorization.
  7. An apparatus for securing data on a removable memory device comprising:
    a data processing apparatus (121, 224);
    a removable memory device (128, 200, 610) removably coupled to said data processing apparatus;
    a housing (745) wherein the housing (745) contains said removable memory device (128, 200, 610);
    an access controller (226) coupled to said data processing apparatus (224) and said removable memory device (200), wherein said access controller controls access to said removable memory device;
    a manual key interface (127) wherein the manual key interface (127) state is dependent on some condition manually provided by a user wherein the manual condition establishes an identity of said user;
    a status indicator (629) coupled to a security processor (620) wherein said status indicator (629) indicates the state of accessibility of said removable memory device (610); and
    a mechanical constraining device (326, 964) to constrain physical removal (617) of said removable memory device (128) from said data processing apparatus (121, 224),
    wherein said access controller (226) is configured to detect (502) an attempt by a user to electronically access said removable memory device (128), authenticate (504) an identity of said user, if said user is authorized, enable (510) access, and if said user is not authorized, inhibit (511) access and position said mechanical constraining device (326, 964) to constrain the removal of said removable memory device (128).
  8. The apparatus of Claim 7 further comprising a security processor (620) coupled to said access controller (226) and said manual key interface (127), wherein said security processor (620) controls said functions of said access controller (226) and said security processor (620), via said manual key interface (127, determines a state of said manual key interface (127).
  9. The apparatus of Claim 8, wherein said security processor (620), via a identity authorization system module, compares said state of said biometric key interface to a criteria to establish identity of said user.
  10. The apparatus of Claim 7, wherein, upon inhibiting (511) said access to said data, said access controller (226) is configured to permanently erase and delete said data if said access is attempted by said user when said user is not authorized.
  11. The apparatus of Claim 7, wherein said mechanical constraining device functions to effectively constrain said removable memory device and not allow said removable memory device to be removed from said computing apparatus without permanent, irreparable damage to said removable memory device with the ultimate effect of rendering said removable memory device unusable and inert.
EP06787031A 2005-08-30 2006-07-11 Method, apparatus, and system for securing data on a removable memory device Not-in-force EP1929422B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/216,253 US7938863B2 (en) 2005-08-30 2005-08-30 Method, apparatus, and system for securing data on a removable memory device
PCT/US2006/027069 WO2007027299A1 (en) 2005-08-30 2006-07-11 A method, apparatus, and system for securing data on a removable memory device

Publications (2)

Publication Number Publication Date
EP1929422A1 EP1929422A1 (en) 2008-06-11
EP1929422B1 true EP1929422B1 (en) 2013-02-27

Family

ID=37151993

Family Applications (1)

Application Number Title Priority Date Filing Date
EP06787031A Not-in-force EP1929422B1 (en) 2005-08-30 2006-07-11 Method, apparatus, and system for securing data on a removable memory device

Country Status (4)

Country Link
US (1) US7938863B2 (en)
EP (1) EP1929422B1 (en)
CN (1) CN101253505B (en)
WO (1) WO2007027299A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101233469B (en) 2005-07-21 2013-06-05 克莱夫公司 Memory lock system
US20070118757A1 (en) * 2005-11-07 2007-05-24 Skinner David N Method, apparatus, and system for securing data on a removable memory device
US8191120B2 (en) * 2006-01-05 2012-05-29 Sandisk Il Ltd. Powerless electronic storage lock
EP2074545A4 (en) 2006-10-10 2011-12-07 Data Locker Internat Llc Security system for external data storage apparatus and control method thereof
US9286493B2 (en) * 2009-01-07 2016-03-15 Clevx, Llc Encryption bridge system and method of operation thereof
US9015840B2 (en) * 2009-06-08 2015-04-21 Clevx, Llc Portable media system with virus blocker and method of operation thereof
CN102479301B (en) * 2010-11-26 2015-07-15 中国科学院信息工程研究所 Universal serial bus (USB) storage equipment and access control method thereof
US9436830B2 (en) * 2012-10-17 2016-09-06 Sandisk Technologies Llc Securing access of removable media devices
US8956173B2 (en) 2012-10-17 2015-02-17 Sandisk Technologies Inc. Securing access of removable media devices
IL223225A (en) * 2012-11-25 2013-11-28 Eliahu Antopolsky System for meetings documentation that enables access to the documentation only by the consent of the participants
CN103914664A (en) * 2012-12-31 2014-07-09 比亚迪股份有限公司 Controller and control method having interior memory bank protecting function
US9683393B2 (en) 2014-10-31 2017-06-20 ACCO Brands Corporation System for physically securing an electronic device
WO2016186109A1 (en) * 2015-05-18 2016-11-24 Necフィールディング株式会社 Storage device, access prohibition method, and program
CN106529348A (en) * 2016-10-31 2017-03-22 余必亚 Computer storage system with double storage modules
CN111209547B (en) * 2018-11-22 2023-04-18 联想企业解决方案(新加坡)有限公司 Computing device and data security access method
US12124551B2 (en) 2022-07-22 2024-10-22 Dell Products L.P. Authentication of memory expansion capabilities

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040017738A1 (en) * 2000-06-16 2004-01-29 Morihiko Uchida Disk drive device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7272723B1 (en) * 1999-01-15 2007-09-18 Safenet, Inc. USB-compliant personal key with integral input and output devices
US6745330B1 (en) * 1999-06-22 2004-06-01 Hewlett-Packard Company, L.P. Computer system having peripheral device look
TWI246028B (en) * 2001-06-28 2005-12-21 Trek 2000 Int Ltd A portable device having biometrics-based authentication capabilities
JP2005011151A (en) * 2003-06-20 2005-01-13 Renesas Technology Corp Memory card
JP4701615B2 (en) 2004-01-23 2011-06-15 ソニー株式会社 Information storage device
CN2736827Y (en) * 2004-08-11 2005-10-26 颜闿华 Mobile disk gain device having push-button type electronic cipher lock for security and thief proofing
US7390201B1 (en) * 2005-05-19 2008-06-24 Sandia Corporation Data port security lock
CN101233469B (en) * 2005-07-21 2013-06-05 克莱夫公司 Memory lock system
US20070118757A1 (en) * 2005-11-07 2007-05-24 Skinner David N Method, apparatus, and system for securing data on a removable memory device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040017738A1 (en) * 2000-06-16 2004-01-29 Morihiko Uchida Disk drive device

Also Published As

Publication number Publication date
US20070061894A1 (en) 2007-03-15
CN101253505B (en) 2011-10-05
WO2007027299A1 (en) 2007-03-08
CN101253505A (en) 2008-08-27
EP1929422A1 (en) 2008-06-11
US7938863B2 (en) 2011-05-10

Similar Documents

Publication Publication Date Title
EP1929422B1 (en) Method, apparatus, and system for securing data on a removable memory device
EP0596276B1 (en) Secure memory card
US6367017B1 (en) Apparatus and method for providing and authentication system
KR101334968B1 (en) Memory lock system
US6087955A (en) Apparatus and method for providing an authentication system
EP2212801B1 (en) System and method for resizing a drive's partition and exchanging partition sizes between a flash memory controller and a smart card
US20080246584A1 (en) Locking digital pen
US20070136593A1 (en) Secure information storage apparatus
US20160239436A1 (en) Data security system
US20080235809A1 (en) Restricted erase and unlock of data storage devices
US20090125645A1 (en) System and method for supporting multiple tokens having a smart card to control parameters of a flash memory device
EP0689702A1 (en) A secure application card for sharing application data and procedures among a plurality of microprocessors
JPH07508604A (en) A device that protects programs and data using a card reader
US20100023650A1 (en) System and method for using a smart card in conjunction with a flash memory controller to detect logon authentication
US8490204B2 (en) Selective protection of files on portable memory devices
WO2007055939A1 (en) A method, apparatus, and system for securing data on a removable memory device
WO1995024698A1 (en) A secure memory card
US20100174902A1 (en) Portable storage media with high security function
KR20050039290A (en) Storage media protective apparatus and method thereof
WO2000016179A1 (en) Method and device of disabling the unauthorised use of a computer
JP2000187920A (en) Information processor

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20080328

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

17Q First examination report despatched

Effective date: 20080707

DAX Request for extension of the european patent (deleted)
GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602006034786

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: G06F0021020000

Ipc: G06F0021780000

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 21/78 20130101AFI20130117BHEP

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 598832

Country of ref document: AT

Kind code of ref document: T

Effective date: 20130315

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602006034786

Country of ref document: DE

Effective date: 20130425

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 598832

Country of ref document: AT

Kind code of ref document: T

Effective date: 20130227

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130527

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130607

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130627

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

REG Reference to a national code

Ref country code: NL

Ref legal event code: VDEP

Effective date: 20130227

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130627

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130528

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20131128

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602006034786

Country of ref document: DE

Effective date: 20131128

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130731

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130711

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130227

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130711

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20060711

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 11

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 12

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 13

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20201214

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20210623

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20201214

Year of fee payment: 16

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602006034786

Country of ref document: DE

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20220711

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220711

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20230201